Security at Credlier
We take the security of your data seriously. Learn about the measures we take to protect your information.
All data is encrypted at rest using AES-256 and in transit using TLS 1.3.
Role-based access control with granular permissions for team members.
Comprehensive audit logs of all account activity and API access.
Hosted on SOC 2 Type II certified cloud infrastructure with 99.99% uptime.
Compliance & Certifications
Data Encryption
All sensitive data, including API keys and credentials, are encrypted using AES-256 encryption at rest. Data in transit is protected using TLS 1.3 with perfect forward secrecy.
Access Management
We implement the principle of least privilege across our organization. Employee access to production systems is strictly controlled and regularly audited.
Penetration Testing
We conduct regular penetration tests with third-party security firms. Our bug bounty program rewards security researchers who responsibly disclose vulnerabilities.
Incident Response
Our security team monitors systems 24/7 and maintains documented incident response procedures. We commit to notifying affected customers within 72 hours of any breach.
Report a Vulnerability
Found a security issue? We appreciate responsible disclosure and offer rewards for valid reports.